Pairings for cryptographers

Article Properties
Journal Categories
Science
Mathematics
Technology
Engineering (General)
Civil engineering (General)
Technology
Technology (General)
Industrial engineering
Management engineering
Applied mathematics
Quantitative methods
Refrences
Title Journal Journal Categories Citations Publication Date
On computable isomorphisms in efficient asymmetric pairing-based systems Discrete Applied Mathematics
  • Science: Mathematics
  • Technology: Engineering (General). Civil engineering (General)
  • Technology: Technology (General): Industrial engineering. Management engineering: Applied mathematics. Quantitative methods
  • Technology: Engineering (General). Civil engineering (General)
16 2007
Efficient pairing computation on supersingular Abelian varieties Designs, Codes and Cryptography
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Technology (General): Industrial engineering. Management engineering: Applied mathematics. Quantitative methods
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
115 2007
Identity-based key agreement protocols from pairings International Journal of Information Security
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
143 2007
Efficient ID-KEM based on the Sakai–Kasahara key construction IEE Proceedings - Information Security 10 2006
The Eta pairing revisited 2006
Citations
Title Journal Journal Categories Citations Publication Date
An anonymous authentication scheme with conditional privacy-preserving for Vehicular Ad hoc Networks based on zero-knowledge proof and Blockchain Ad Hoc Networks
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
1 2024
How can the holder trust the verifier? A CP-ABPRE-based solution to control the access to claims in a self-sovereign-identity scenario Blockchain: Research and Applications
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2024
A regulated anonymous cryptocurrency with batch linkability Computer Standards & Interfaces
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
1 2024
Key-aggregate based access control encryption for flexible cloud data sharing Computer Standards & Interfaces
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2024
AASSI: A Self-Sovereign Identity Protocol With Anonymity and Accountability IEEE Access
  • Technology: Electrical engineering. Electronics. Nuclear engineering
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
2024
Citations Analysis
Category Category Repetition
Science: Mathematics: Instruments and machines: Electronic computers. Computer science117
Science: Science (General): Cybernetics: Information theory80
Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware79
Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software67
Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks63
Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication57
Technology: Technology (General): Industrial engineering. Management engineering: Information technology43
Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics25
Technology: Technology (General): Industrial engineering. Management engineering: Applied mathematics. Quantitative methods19
Technology: Engineering (General). Civil engineering (General)14
Technology: Electrical engineering. Electronics. Nuclear engineering9
Science: Science (General)6
Science: Mathematics5
Science: Chemistry5
Technology: Technology (General): Industrial engineering. Management engineering5
Technology: Chemical technology4
Science: Mathematics: Instruments and machines4
Technology: Mechanical engineering and machinery4
Science3
Science: Physics3
Science: Chemistry: Analytical chemistry3
Technology: Engineering (General). Civil engineering (General): Transportation engineering3
Medicine2
Science: Biology (General)2
Science: Chemistry: General. Including alchemy1
Technology: Electrical engineering. Electronics. Nuclear engineering: Materials of engineering and construction. Mechanics of materials1
Technology: Chemical technology: Chemical engineering1
Technology1
Medicine: Medicine (General): Computer applications to medicine. Medical informatics1
Medicine: Internal medicine: Neurosciences. Biological psychiatry. Neuropsychiatry1
Technology: Technology (General)1
The category Science: Mathematics: Instruments and machines: Electronic computers. Computer science 117 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled Discrete Logarithm Problems with Auxiliary Inputs and was published in 2009. The most recent citation comes from a 2024 study titled AASSI: A Self-Sovereign Identity Protocol With Anonymity and Accountability. This article reached its peak citation in 2022, with 25 citations. It has been cited in 82 different journals, 17% of which are open access. Among related journals, the International Journal of Information Security cited this research the most, with 10 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year